共 50 条
- [1] Optimal Algorithms for Finding User Access Sessions from Very Large Web Logs [J]. World Wide Web, 2003, 6 : 259 - 279
- [3] Optimal Algorithms for Generation of User Session Sequences Using Server Side Web User Logs [J]. 2009 INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE SECURITY, 2009, : 151 - +
- [4] Finding All Maximal Paths In Web User Sessions [J]. PROCEEDINGS OF THE 25TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'16 COMPANION), 2016, : 15 - 16
- [5] An evolutionary approach for clustering user access patterns from web logs [J]. AI 2006: ADVANCES IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2006, 4304 : 1184 - 1188
- [6] Linear and sublinear time algorithms for mining frequent traversal path patterns from very large web logs [J]. SEVENTH INTERNATIONAL DATABASE ENGINEERING AND APPLICATIONS SYMPOSIUM, PROCEEDINGS, 2003, : 117 - 122
- [7] Mining and tracking evolving web user trends from large web server logs [J]. Statistical Analysis and Data Mining, 2010, 3 (02): : 106 - 125
- [8] Discovery of web frequent patterns and user characteristics from web access logs: A framework for dynamic web personalization [J]. 3RD IEEE SYMPOSIUM ON APPLICATION SPECIFIC SYSTEMS AND SOFTWARE ENGINEERING TECHNOLOGY, PROCEEDINGS, 2000, : 3 - 8
- [9] Efficient mining of temporal traversal patterns from very large Web logs [J]. DMIN '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON DATA MINING, 2005, : 10 - 16
- [10] GuidedTracker: Track the Victims with Access Logs to Finding Malicious Web Pages [J]. 2014 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2014), 2014, : 564 - 569